A Fixed Network Transmission Based on Kerberos Authentication Protocol

A Fixed Network Transmission Based on Kerberos Authentication Protocol
Authors : M.Chalapathi Rao
Publication Date: 30-10-2013


Author(s):  M.Chalapathi Rao

Published in:   International Journal of Engineering Research & Technology

License:  This work is licensed under a Creative Commons Attribution 4.0 International License.

Website: www.ijert.org

Volume/Issue:   Vol.2 - Issue 11 (November - 2013)

e-ISSN:   2278-0181


We concentrated on cryptographic protocols aimed to procure authentication, confidentiality and data integrity over the networks. We wish to plan an end user authentication protocol that is not liable to password guessing attacks. We wish to present an authentication protocol depend on generally Kerberos protocol with a slight alteration in the Kerberos database contains all of our realm's Kerberos principals. We suggested in this paper the protocol is separate of the user password. The KDC supplies session tickets and temporary session keys to users Kerberos keys are created by KDC. These keys are used by the Kerberos client to communicate with the Kerberos KDC in a secure manner. The KDC will secure data for every instance in the realm. This data will be hashed and then, the output digest will be encrypted to generate the secret key. The lifetime of the secrete key is managed by system lifetime in this way we beaten weak password In here we come up with Triple DES, MD5 hashing technique and Fisher?Yates shuffle as a random number generator algorithm for Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks.


Number of Citations for this article:  Data not Available


Key Word(s):    


Number of Downloads:     335

Call for Papers - May - 2017



                 Call for Thesis - 2017 

     Publish your Ph.D/Master's Thesis Online

              Publish Ph.D Master Thesis Online as Book